An Overview of the Strategic Advantages of AI-Powered Threat Intelligence in the Cloud

An Overview of the Strategic Advantages of AI-Powered Threat Intelligence in the Cloud

Authors

  • Vinay Mallikarjunaradhya Principal Product Manager, Thomson Reuters, Canada
  • Ameya Shastri Pothukuchi Sr. Product Manager, Microsoft, Redmond, USA
  • Lakshmi Vasuda Kota T Risk Sr Analyst, Voya Services, Windsor, USA

DOI:

https://doi.org/10.55662/JST.2023.4401

Downloads

Keywords:

Artificial Intelligence, Cloud computing, Cyber Security, Microsoft Azure, Predictive Analytics, Software-as-a-Service , SAAS

Abstract

Cloud adoption has become synonymous with business agility and scalability in the digital transformation era. However, this shift has also ushered in a new wave of security threats, necessitating advanced protective measures. Artificial Intelligence (AI) has emerged as a beacon of hope, promising adaptive, predictive, and automated security solutions. Cloud security is becoming more critical than ever with a rise in cyberattacks. AI can improve cloud security drastically. This study examines AI’s significant influence on cloud security, challenges, and opportunities from the vantage point of product leaders. Through a comprehensive exploration of market dynamics, product development nuances, and strategic considerations, this paper offers insights into the pivotal role of product managers in shaping the future of cloud security.



Downloads

Download data is not yet available.

References

Aldridge, Irene and Martin, Payton, ESG in Corporate Filings: An AI Perspective (November 17, 2022). Available at SSRN: https://ssrn.com/abstract=4279479 or http://dx.doi.org/10.2139/ssrn.4279479

https://doi.org/10.2139/ssrn.4279479

Billawa, P., Bambhore, A. T., Ferreyra, N. E. D., Steghöfer, J. P., Scandariato, R., & Simhandl, G. (2022). SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices. Proceedings of the ACM.

https://doi.org/10.1145/3538969.3538986

Gupta, S., & Saini, A. (2014). A REVIEW TO ASSESS OPPORTUNITIES AND SECURITY RISK CHALLENGES IN CLOUD COMPUTING. International Journal of Research in Engineering and Technology.

https://doi.org/10.15623/ijret.2014.0326003

Julia Wagemann, Stephan Siemen, Bernhard Seeger & Jörg Bendix (2021) A user perspective on future cloud-based services for Big Earth data, International Journal of Digital Earth, 14:12, 1758-1774, DOI: 10.1080/17538947.2021.1982031

https://doi.org/10.1080/17538947.2021.1982031

L. W. Santoso, "Cloud Technology: Opportunities for Cybercriminals and Security Challenges," 2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media), Bali, Indonesia, 2019, pp. 18-23, doi: 10.1109/Ubi-Media.2019.00013.

https://doi.org/10.1109/Ubi-Media.2019.00013

Lynn, T., Rosati, P., Fox, G. (2020). Measuring the Business Value of Cloud Computing: Emerging Paradigms and Future Directions for Research. In: Lynn, T., Mooney, J., Rosati, P., Fox, G. (eds) Measuring the Business Value of Cloud Computing. Palgrave Studies in Digital Business & Enabling Technologies. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-43198-3_7

https://doi.org/10.1007/978-3-030-43198-3_7

McEnroe, P., Wang, S., & Liyanage, M. (2022). A Survey on the Convergence of Edge Computing and AI for UAVs: Opportunities and Challenges.

https://doi.org/10.1109/JIOT.2022.3176400

M. M. Kamruzzaman, Ibrahim Alrashdi, Ali Alqazzaz, "New Opportunities, Challenges, and Applications of Edge-AI for Connected Healthcare in Internet of Medical Things for Smart Cities", Journal of Healthcare Engineering, vol. 2022, Article ID 2950699, 14 pages, 2022. https://doi.org/10.1155/2022/2950699

https://doi.org/10.1155/2022/2950699

PMid:35251564 PMCid:PMC8890828

Nair, R., & Meenakumari, J. (2022). IT PROJECT RISK MANAGEMENT FOR CLOUD ENVIRONMENT LEVERAGING ARTIFICIAL INTELLIGENCE. International Journal of Research -GRANTHAALAYAH, 10(12), 55-68. https://doi.org/10.29121/granthaalayah.v10.i12.2022.4940

https://doi.org/10.29121/granthaalayah.v10.i12.2022.4940

Onyshchenko, O., Shevchuk, K., Shara, Y., Koval, N., & Demchuk, O. (2022). Industry 4.0 and accounting: directions, challenges, opportunities. International Journal of Research in Engineering and Technology. PDF

https://doi.org/10.14807/ijmp.v13i3.1993

Pothukuchi, Ameya Shastri & Kota, Lakshmi Vasuda & Mallikarjunaradhya, Vinay. (2023). IMPACT OF GENERATIVE AI ON THE SOFTWARE DEVELOPMENT LIFE CYCLE (SDLC)

Ravi Ravichandran, Chee-Yee Chong, and Robert E. Smith "Artificial intelligence and machine learning: a perspective on integrated systems opportunities and challenges for multi-domain operations", Proc. SPIE 11746, Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications III, 1174606 (12 April 2021); https://doi.org/10.1117/12.2587216

https://doi.org/10.1117/12.2587216

S. Neupane et al., "Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities," in IEEE Access, vol. 10, pp. 112392-112415, 2022, doi: 10.1109/ACCESS.2022.3216617.

https://doi.org/10.1109/ACCESS.2022.3216617

Stergiou, Christos L., Elisavet Bompoli, and Konstantinos E. Psannis. 2023. "Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario" Applied Sciences 13, no. 2: 758. https://doi.org/10.3390/app13020758

https://doi.org/10.3390/app13020758

Subhadra, A. (2020). An Analysis of Data Security and Privacy for Cloud Computing. Asian Journal of Computer Science and Technology, 9(1), 27-39. https://doi.org/10.51983/ajcst-2020.9.1.2153

https://doi.org/10.51983/ajcst-2020.9.1.2153

Xin Zuo, Zhongwei Cui, Hong Lin, Dong Wang, "Route Optimization of Agricultural Product Distribution Based on Agricultural Iot and Neural Network from the Perspective of Fabric Blockchain", Wireless Communications and Mobile Computing, vol. 2022, Article ID 5106215, 11 pages, 2022. https://doi.org/10.1155/2022/5106215

https://doi.org/10.1155/2022/5106215

Downloads

Published

25-08-2023
Citation Metrics
DOI: 10.55662/JST.2023.4401
Published: 25-08-2023

How to Cite

Mallikarjunaradhya, V., A. S. Pothukuchi, and L. V. Kota. “An Overview of the Strategic Advantages of AI-Powered Threat Intelligence in the Cloud”. Journal of Science & Technology, vol. 4, no. 4, Aug. 2023, pp. 1-12, doi:10.55662/JST.2023.4401.
PlumX Metrics

Plaudit

License Terms

Ownership and Licensing:

Authors of this research paper submitted to the Journal of Science & Technology retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.

License Permissions:

Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal of Science & Technology. This license allows for the broad dissemination and utilization of research papers.

Additional Distribution Arrangements:

Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in the Journal of Science & Technology.

Online Posting:

Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal of Science & Technology. Online sharing enhances the visibility and accessibility of the research papers.

Responsibility and Liability:

Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Journal of Science & Technology and The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.

Loading...